{"id":"https://openalex.org/W3110833672","doi":"https://doi.org/10.1145/3427228.3427241","title":"On the Feasibility of Automating Stock Market Manipulation","display_name":"On the Feasibility of Automating Stock Market Manipulation","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3110833672","doi":"https://doi.org/10.1145/3427228.3427241","mag":"3110833672"},"language":"en","primary_location":{"id":"doi:10.1145/3427228.3427241","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3427228.3427241","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3427228.3427241","source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3427228.3427241","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084633808","display_name":"Carter Yagemann","orcid":"https://orcid.org/0000-0002-8018-0341"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Carter Yagemann","raw_affiliation_strings":["Georgia Institute of Technology, United States of America"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, United States of America","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052526223","display_name":"Simon P. Chung","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Simon P. Chung","raw_affiliation_strings":["Georgia Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057085782","display_name":"Erkam Uzun","orcid":"https://orcid.org/0000-0001-5185-7723"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Erkam Uzun","raw_affiliation_strings":["Georgia Institute of Technology, United States of America"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, United States of America","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036781066","display_name":"Sai Ragam","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sai Ragam","raw_affiliation_strings":["Georgia Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021029981","display_name":"Brendan Saltaformaggio","orcid":"https://orcid.org/0000-0001-5859-6925"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brendan Saltaformaggio","raw_affiliation_strings":["Georgia Institute of Technology, United States of America"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, United States of America","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047140382","display_name":"Wenke Lee","orcid":"https://orcid.org/0000-0003-2761-1277"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenke Lee","raw_affiliation_strings":["Georgia Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5084633808"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":0.9736,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78746453,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"277","last_page":"290"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7582103610038757},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6914350986480713},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.6854358315467834},{"id":"https://openalex.org/keywords/ibm","display_name":"IBM","score":0.5986850261688232},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5731778144836426},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.4872118830680847},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.43731608986854553},{"id":"https://openalex.org/keywords/market-manipulation","display_name":"Market manipulation","score":0.41002291440963745},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32484501600265503},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.25181514024734497},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.23408010601997375},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.13433212041854858},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.10512477159500122},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.104861319065094}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7582103610038757},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6914350986480713},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.6854358315467834},{"id":"https://openalex.org/C70388272","wikidata":"https://www.wikidata.org/wiki/Q5968558","display_name":"IBM","level":2,"score":0.5986850261688232},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5731778144836426},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.4872118830680847},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.43731608986854553},{"id":"https://openalex.org/C2779721758","wikidata":"https://www.wikidata.org/wiki/Q400707","display_name":"Market manipulation","level":2,"score":0.41002291440963745},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32484501600265503},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25181514024734497},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.23408010601997375},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.13433212041854858},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.10512477159500122},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.104861319065094},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3427228.3427241","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3427228.3427241","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3427228.3427241","source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3427228.3427241","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3427228.3427241","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3427228.3427241","source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3110833672.pdf","grobid_xml":"https://content.openalex.org/works/W3110833672.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1412796528","https://openalex.org/W1508206474","https://openalex.org/W1536353075","https://openalex.org/W1553185794","https://openalex.org/W1787296045","https://openalex.org/W1857870385","https://openalex.org/W1882794413","https://openalex.org/W1984984513","https://openalex.org/W2006809639","https://openalex.org/W2029535677","https://openalex.org/W2081969355","https://openalex.org/W2091692346","https://openalex.org/W2100307718","https://openalex.org/W2107247620","https://openalex.org/W2110329955","https://openalex.org/W2152239535","https://openalex.org/W2163785777","https://openalex.org/W2184801043","https://openalex.org/W2542080616","https://openalex.org/W2620687831","https://openalex.org/W2741908740","https://openalex.org/W2748868501","https://openalex.org/W2787923712","https://openalex.org/W2808183882","https://openalex.org/W2907584873","https://openalex.org/W3103150840","https://openalex.org/W3123510220"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W2901835651","https://openalex.org/W3005861778","https://openalex.org/W2883616266","https://openalex.org/W186576250","https://openalex.org/W2372254325","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964"],"abstract_inverted_index":{"This":[0],"work":[1],"presents":[2],"the":[3,7,49,113],"first":[4],"findings":[5,62],"on":[6,107,150],"feasibility":[8],"of":[9,28,51,71,98,116],"using":[10,87],"botnets":[11],"to":[12,43,78,100,131],"automate":[13],"stock":[14],"market":[15,89],"manipulation.":[16],"Our":[17],"analysis":[18],"incorporates":[19],"data":[20],"gathered":[21,139],"from":[22],"SEC":[23],"case":[24],"files,":[25],"security":[26],"surveys":[27],"online":[29],"brokerages,":[30],"and":[31,57,75,85],"dark":[32],"web":[33],"marketplace":[34],"data.":[35],"We":[36,59,81],"address":[37],"several":[38],"technical":[39],"challenges,":[40],"including":[41],"how":[42],"adapt":[44],"existing":[45,153],"techniques":[46],"for":[47],"automation,":[48],"cost":[50],"hijacking":[52],"brokerage":[53,76],"accounts,":[54],"avoiding":[55],"detection,":[56],"more.":[58],"consolidate":[60],"our":[61,83],"into":[63,146],"a":[64,95,104],"working":[65],"proof-of-concept,":[66],"man-in-the-browser":[67],"malware,":[68],"Bot2Stock,":[69],"capable":[70],"controlling":[72],"victim":[73],"email":[74],"accounts":[77],"commit":[79],"fraud.":[80],"evaluate":[82],"bots":[84,99,130],"protocol":[86],"agent-based":[88],"simulations,":[90],"where":[91],"we":[92],"find":[93],"that":[94],"1.5%":[96],"ratio":[97,124],"benign":[101],"traders":[102],"yields":[103],"2.8%":[105],"return":[106],"investment":[108],"(ROI)":[109],"per":[110],"attack.":[111],"Given":[112],"short":[114],"duration":[115],"each":[117],"attack":[118],"(<":[119],"1":[120,141],"minute),":[121],"achieving":[122],"this":[123],"is":[125],"trivial,":[126],"requiring":[127],"only":[128],"4":[129],"target":[132],"stocks":[133],"like":[134],"IBM.":[135],"1,000":[136],"bots,":[137],"cumulatively":[138],"over":[140],"year,":[142],"can":[143],"turn":[144],"$100,000":[145],"$1,022,000,":[147],"placing":[148],"Bot2Stock":[149],"par":[151],"with":[152],"botnet":[154],"scams.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
